Choicejacking Emerges as Sophisticated Threat to Mobile Devices Through Public Charging Ports
Share this article
Public charging stations have long been cybersecurity minefields, but a sophisticated new attack vector called choicejacking now bypasses existing mobile OS protections to steal sensitive data from connected devices. According to research highlighted by NordVPN, this technique represents a dangerous evolution of traditional juicejacking threats that security professionals and mobile developers need to understand.
How Choicejacking Exploits Trust in Charging Infrastructure
Choicejacking works by manipulating devices into enabling data transfer mode without user consent. Malicious charging stations disguised as legitimate ports impersonate USB or Bluetooth input devices, then employ techniques like:
- Keystroke injection to simulate user authorization
- Input buffer overflows to force unintended behaviors
- Protocol abuse of Media Transfer Protocol (MTP) and Picture Transfer Protocol (PTP)
"With a single deceptive prompt, attackers can trick people into enabling data transfer, potentially exposing personal files," explains Adrianus Warmenhoven, cybersecurity advisor at NordVPN. "These attacks exploit the trust we place in everyday interactions with our smartphones."
Bypassing OS-Level Defenses
Modern mobile operating systems previously mitigated juicejacking risks by prompting users to approve data transfers when connecting to charging stations. However, researchers from Graz University of Technology discovered vulnerabilities allowing attackers to circumvent these safeguards. The attack can execute in as little as 133 milliseconds and affects both Android and iOS devices in certain configurations.
Practical Protection Strategies
Developers and security teams should note these mitigation approaches:
1. Portable power banks eliminate public charging risks entirely
2. AC adapter use with personal cables avoids USB data lines
3. Enforce 'charge only' mode through enterprise MDM policies
4. Maintain battery levels above 10% to avoid emergency charging
5. Prioritize OS updates that patch input protocol vulnerabilities
As mobile devices increasingly serve as primary computing platforms, this attack vector highlights the expanding threat surface in public infrastructure. The cybersecurity community must develop more robust hardware authentication protocols while manufacturers reconsider USB's inherent trust model. For now, awareness remains the first line of defense against these rapidly evolving physical-layer attacks.
Source: ZDNet